Optimization of a novel programmable data-flow crypto processor using NSGA-II algorithm

[Display omitted] The optimization of a novel programmable data-flow crypto processor dedicated to security applications is considered. An architecture based on assigning basic functional units to four synchronous regions was proposed in a previous work. In this paper, the problem of selecting the n...

Full description

Saved in:
Bibliographic Details
Published inJournal of advanced research Vol. 12; pp. 67 - 78
Main Authors El-Hadidi, Mahmoud T., Elsayed, Hany M., Osama, Karim, Bakr, Mohamed, Aslan, Heba K.
Format Journal Article
LanguageEnglish
Published Egypt Elsevier B.V 01.07.2018
Elsevier
Subjects
Online AccessGet full text

Cover

Loading…
Abstract [Display omitted] The optimization of a novel programmable data-flow crypto processor dedicated to security applications is considered. An architecture based on assigning basic functional units to four synchronous regions was proposed in a previous work. In this paper, the problem of selecting the number of synchronous regions and the distribution of functional units among these regions is formulated as a combinatorial multi-objective optimization problem. The objective functions are chosen as: the implementation area, the execution delay, and the consumed energy when running the well-known AES algorithm. To solve this problem, a modified version of the Genetic Algorithm - known as NSGA-II - linked to a component database and a processor emulator, has been invoked. It is found that the performance improvement introduced by operating the processor regions at different clocks is offset by the necessary delay introduced by wrappers needed to communicate between the asynchronous regions. With a two clock-periods delay, the minimum processor delay of the asynchronous case is 311% of the delay obtained in the synchronous case, and the minimum consumed energy is 308% more in the asynchronous design when compared to its synchronous counterpart. This research also identifies the Instruction Region as the main design bottleneck. For the synchronous case, the Pareto front contains solutions with 4 regions that minimize delay and solutions with 7 regions that minimize area or energy. A minimum-delay design is selected for hardware implementation, and the FPGA version of the optimized processor is tested and correct operation is verified for AES and RC6 encryption/decryption algorithms.
AbstractList The optimization of a novel programmable data-flow crypto processor dedicated to security applications is considered. An architecture based on assigning basic functional units to four synchronous regions was proposed in a previous work. In this paper, the problem of selecting the number of synchronous regions and the distribution of functional units among these regions is formulated as a combinatorial multi-objective optimization problem. The objective functions are chosen as: the implementation area, the execution delay, and the consumed energy when running the well-known AES algorithm. To solve this problem, a modified version of the Genetic Algorithm - known as NSGA-II - linked to a component database and a processor emulator, has been invoked. It is found that the performance improvement introduced by operating the processor regions at different clocks is offset by the necessary delay introduced by wrappers needed to communicate between the asynchronous regions. With a two clock-periods delay, the minimum processor delay of the asynchronous case is 311% of the delay obtained in the synchronous case, and the minimum consumed energy is 308% more in the asynchronous design when compared to its synchronous counterpart. This research also identifies the Instruction Region as the main design bottleneck. For the synchronous case, the Pareto front contains solutions with 4 regions that minimize delay and solutions with 7 regions that minimize area or energy. A minimum-delay design is selected for hardware implementation, and the FPGA version of the optimized processor is tested and correct operation is verified for AES and RC6 encryption/decryption algorithms.
The optimization of a novel programmable data-flow crypto processor dedicated to security applications is considered. An architecture based on assigning basic functional units to four synchronous regions was proposed in a previous work. In this paper, the problem of selecting the number of synchronous regions and the distribution of functional units among these regions is formulated as a combinatorial multi-objective optimization problem. The objective functions are chosen as: the implementation area, the execution delay, and the consumed energy when running the well-known AES algorithm. To solve this problem, a modified version of the Genetic Algorithm - known as NSGA-II - linked to a component database and a processor emulator, has been invoked. It is found that the performance improvement introduced by operating the processor regions at different clocks is offset by the necessary delay introduced by wrappers needed to communicate between the asynchronous regions. With a two clock-periods delay, the minimum processor delay of the asynchronous case is 311% of the delay obtained in the synchronous case, and the minimum consumed energy is 308% more in the asynchronous design when compared to its synchronous counterpart. This research also identifies the Instruction Region as the main design bottleneck. For the synchronous case, the Pareto front contains solutions with 4 regions that minimize delay and solutions with 7 regions that minimize area or energy. A minimum-delay design is selected for hardware implementation, and the FPGA version of the optimized processor is tested and correct operation is verified for AES and RC6 encryption/decryption algorithms. Keywords: Programmable crypto processor, Data-flow crypto processor, NSGA-II Genetic Algorithm, Multi-objective optimization, FPGA implementation, Design space exploration
[Display omitted] The optimization of a novel programmable data-flow crypto processor dedicated to security applications is considered. An architecture based on assigning basic functional units to four synchronous regions was proposed in a previous work. In this paper, the problem of selecting the number of synchronous regions and the distribution of functional units among these regions is formulated as a combinatorial multi-objective optimization problem. The objective functions are chosen as: the implementation area, the execution delay, and the consumed energy when running the well-known AES algorithm. To solve this problem, a modified version of the Genetic Algorithm - known as NSGA-II - linked to a component database and a processor emulator, has been invoked. It is found that the performance improvement introduced by operating the processor regions at different clocks is offset by the necessary delay introduced by wrappers needed to communicate between the asynchronous regions. With a two clock-periods delay, the minimum processor delay of the asynchronous case is 311% of the delay obtained in the synchronous case, and the minimum consumed energy is 308% more in the asynchronous design when compared to its synchronous counterpart. This research also identifies the Instruction Region as the main design bottleneck. For the synchronous case, the Pareto front contains solutions with 4 regions that minimize delay and solutions with 7 regions that minimize area or energy. A minimum-delay design is selected for hardware implementation, and the FPGA version of the optimized processor is tested and correct operation is verified for AES and RC6 encryption/decryption algorithms.
Author Osama, Karim
Elsayed, Hany M.
El-Hadidi, Mahmoud T.
Bakr, Mohamed
Aslan, Heba K.
AuthorAffiliation a Department of Electronics and Electrical Communications Engineering, Faculty of Engineering, Cairo University, Giza 12613, Egypt
b College of Computing and Information Technology, Arab Academy of Science and Technology and Maritime Transport, Cairo, Egypt
c Informatics Department, Electronics Research Institute, Cairo, Egypt
AuthorAffiliation_xml – name: c Informatics Department, Electronics Research Institute, Cairo, Egypt
– name: a Department of Electronics and Electrical Communications Engineering, Faculty of Engineering, Cairo University, Giza 12613, Egypt
– name: b College of Computing and Information Technology, Arab Academy of Science and Technology and Maritime Transport, Cairo, Egypt
Author_xml – sequence: 1
  givenname: Mahmoud T.
  surname: El-Hadidi
  fullname: El-Hadidi, Mahmoud T.
  email: hadidi@eun.eg, mahmoud.hadidi@gmail.com
  organization: Department of Electronics and Electrical Communications Engineering, Faculty of Engineering, Cairo University, Giza 12613, Egypt
– sequence: 2
  givenname: Hany M.
  surname: Elsayed
  fullname: Elsayed, Hany M.
  organization: Department of Electronics and Electrical Communications Engineering, Faculty of Engineering, Cairo University, Giza 12613, Egypt
– sequence: 3
  givenname: Karim
  surname: Osama
  fullname: Osama, Karim
  organization: Department of Electronics and Electrical Communications Engineering, Faculty of Engineering, Cairo University, Giza 12613, Egypt
– sequence: 4
  givenname: Mohamed
  orcidid: 0000-0002-9654-9369
  surname: Bakr
  fullname: Bakr, Mohamed
  organization: College of Computing and Information Technology, Arab Academy of Science and Technology and Maritime Transport, Cairo, Egypt
– sequence: 5
  givenname: Heba K.
  surname: Aslan
  fullname: Aslan, Heba K.
  organization: Informatics Department, Electronics Research Institute, Cairo, Egypt
BackLink https://www.ncbi.nlm.nih.gov/pubmed/30046480$$D View this record in MEDLINE/PubMed
BookMark eNp9kcFu1DAQhi1UREvpC3BAOXJJsJ3EcSSEVFVQVqraQ0EcLccep46SONjercrT47Bl1V46F49m_vnGmv8tOprdDAi9J7ggmLBPQzFIDwXFpCkIKTCmr9AJxS3OCaXV0SEv6TE6C2HAKUrOW0LeoOMS44pVHJ-gXzdLtJP9I6N1c-ZMJrPZ7WDMFu96L6dJdiNkWkaZm9HdZ8o_LNGtXQUhOJ9tg5377Pr28jzfbDI59s7beDe9Q6-NHAOcPb6n6Oe3rz8uvudXN5ebi_OrXNWUxLztTGUwKSUHBh00usFamdKUEmTX1JLWynBDeaco4YR1jCZpzUrMm4pwxctTtNlztZODWLydpH8QTlrxr-B8L6SPVo0gzMroNK-I1hXXmBOl27pVGtIOXunE-rJnLdtuAq1gjl6Oz6DPO7O9E73bCYbrpmIsAT4-Arz7vYUQxWSDgnGUM7htEBQ3jLdNw1cp3UuVdyF4MIc1BIvVYDGI1WCxGiwIEcngNPTh6QcPI__tTILPewGkk-8seBGUhVmBth5UTDexL_H_ArSCulk
CitedBy_id crossref_primary_10_1007_s13202_020_01066_1
Cites_doi 10.1007/11552055_2
10.1109/ISCA.2001.937439
10.1145/513918.514113
10.1049/ip-cdt:20050131
10.1007/978-3-662-44491-7_10
10.1007/BF02125404
10.1007/978-3-319-31875-2_26
10.1109/TCE.2004.1277865
10.1109/NRSC.2016.7450850
10.1145/359340.359342
10.1016/j.ress.2005.11.018
10.1145/1146909.1147040
10.1109/4235.996017
10.1007/s13389-011-0025-8
10.1109/DSD.2005.33
10.1109/IPDPS.2011.199
10.1007/978-3-642-00641-8_35
10.1016/S0167-9260(04)00032-X
10.15803/ijnc.2.1_56
10.1007/3-540-48059-5_20
10.1109/ReConFig.2008.76
10.1090/S0025-5718-1987-0866109-5
10.1504/IJHPSA.2010.034541
10.1142/S0218126615501583
10.1109/TPDS.2005.51
10.1145/2501654.2501655
10.1007/s11227-010-0413-3
10.1109/ICCAD.2014.7001346
10.1109/DSD.2007.4341542
10.1109/ICSICT.2008.4734992
10.1109/TVLSI.2009.2037327
10.1109/ISCA.2002.1003573
10.1109/IWRSP.2000.855217
10.1631/jzus.C1200370
10.1007/978-3-540-24714-2_15
10.1109/CMC.2010.127
10.1109/IMSCCS.2006.208
10.1109/CAIA.1993.366666
10.1109/IPDPS.2011.143
10.1145/1013948.1013952
ContentType Journal Article
Copyright 2017
2017 Production and hosting by Elsevier B.V. on behalf of Cairo University. 2017
Copyright_xml – notice: 2017
– notice: 2017 Production and hosting by Elsevier B.V. on behalf of Cairo University. 2017
DBID 6I.
AAFTH
NPM
AAYXX
CITATION
7X8
5PM
DOA
DOI 10.1016/j.jare.2017.11.002
DatabaseName ScienceDirect Open Access Titles
Elsevier:ScienceDirect:Open Access
PubMed
CrossRef
MEDLINE - Academic
PubMed Central (Full Participant titles)
DOAJ Directory of Open Access Journals
DatabaseTitle PubMed
CrossRef
MEDLINE - Academic
DatabaseTitleList PubMed



Database_xml – sequence: 1
  dbid: DOA
  name: Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: NPM
  name: PubMed
  url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed
  sourceTypes: Index Database
DeliveryMethod fulltext_linktorsrc
Discipline Sciences (General)
EISSN 2090-1224
EndPage 78
ExternalDocumentID oai_doaj_org_article_fc218bd841dd48d081cd959cdecf884d
10_1016_j_jare_2017_11_002
30046480
S2090123217301170
Genre Journal Article
GroupedDBID --K
0R~
0SF
1B1
1~5
4.4
457
4G.
53G
5VS
6I.
7-5
AACTN
AAEDT
AAEDW
AAFTH
AAIKJ
AALRI
AAXUO
ABFRF
ABMAC
ACGFS
ADBBV
ADEZE
AEFWE
AEXQZ
AFTJW
AGHFR
AITUG
ALMA_UNASSIGNED_HOLDINGS
AMRAJ
AOIJS
BCNDV
E3Z
EBS
EJD
FDB
GROUPED_DOAJ
GX1
HH5
HYE
HZ~
IPNFZ
IXB
J1W
KQ8
M41
NCXOZ
O-L
O9-
OK1
OZT
RIG
ROL
RPM
SES
SSZ
UNMZH
XH2
ADVLN
AFJKZ
AKRWK
NPM
AAYXX
CITATION
7X8
5PM
ID FETCH-LOGICAL-c521t-9bf4f013a8e6ebe7d70dcf3f3aeab75a25cf8f28bc21816b623a8563087418c83
IEDL.DBID RPM
ISSN 2090-1232
IngestDate Tue Oct 22 15:16:01 EDT 2024
Tue Sep 17 21:24:54 EDT 2024
Sat Oct 05 05:19:40 EDT 2024
Thu Sep 26 15:15:44 EDT 2024
Sat Sep 28 08:46:27 EDT 2024
Fri Feb 23 02:31:22 EST 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Keywords FPGA implementation
Programmable crypto processor
Data-flow crypto processor
Multi-objective optimization
Design space exploration
NSGA-II Genetic Algorithm
Language English
License This is an open access article under the CC BY-NC-ND license.
This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c521t-9bf4f013a8e6ebe7d70dcf3f3aeab75a25cf8f28bc21816b623a8563087418c83
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
ORCID 0000-0002-9654-9369
OpenAccessLink https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6057466/
PMID 30046480
PQID 2076897786
PQPubID 23479
PageCount 12
ParticipantIDs doaj_primary_oai_doaj_org_article_fc218bd841dd48d081cd959cdecf884d
pubmedcentral_primary_oai_pubmedcentral_nih_gov_6057466
proquest_miscellaneous_2076897786
crossref_primary_10_1016_j_jare_2017_11_002
pubmed_primary_30046480
elsevier_sciencedirect_doi_10_1016_j_jare_2017_11_002
PublicationCentury 2000
PublicationDate 2018-07-01
PublicationDateYYYYMMDD 2018-07-01
PublicationDate_xml – month: 07
  year: 2018
  text: 2018-07-01
  day: 01
PublicationDecade 2010
PublicationPlace Egypt
PublicationPlace_xml – name: Egypt
PublicationTitle Journal of advanced research
PublicationTitleAlternate J Adv Res
PublicationYear 2018
Publisher Elsevier B.V
Elsevier
Publisher_xml – name: Elsevier B.V
– name: Elsevier
References IBM 4767–002 PCIe cryptographic coprocessor (HSM) data sheet, IBM Corporation, 2016.
Pargas R, Jain R. A parallel stochastic optimization algorithm for solving 2D bin packing problems. In: Proceedings 9th Conference on Artificial Intelligence for Applications 1993; 18–25.
Hodjat, Verbauwhede (b0070) 2004
Deb (b0215) 2001
Barat F, Lauwereins R. Reconfigurable instruction set processors: a survey. In: Proceedings 11th International Workshop on Rapid System Prototyping (RSP 2000) 21–23 June 2000; 168–73.
Grand M, Bossuet L, Gogniat G, Le Gal B, Delahaye JP, Dallet D. A reconfigurable multi-core cryptoprocessor for multi-channel communication systems. In: Proceedings 25th IEEE International Parallel and Distributed Processing Symposium 16–20 May 2011; 199–206.
Ravi S, Raghunathan A, Potlapally N, Sankardass M. System design methodologies for a wireless security processing platform. In: Proceedings 39th Annual Design Automation Conference (DAC’02) 2002: 777–82.
Mohamadi (b0240) 2010; 4
National Bureau of Standards. Data Encryption Standard, FIPS-Pub. 46. U.S. Department of Commerce January 1977.
Ni S, Dou Y, Chen K, Deng L. A novel design of flexible crypto coprocessor and its application. In: Wu J, Chen H, Wang X, editors. Advanced computer architecture. communications in computer and information science 2014; 451: 128–139.
Lomonaco MJ. Cryptarray: a scalable and reconfigurable architecture for cryptographic applications. M.Sc. Thesis, University of Central Florida, 2004.
Stevens KS, Golani P, Beerel PA. Energy and performance models for synchronous and asynchronous communication. In: IEEE Transactions on VLSI Systems March 2011; 19(3); 369–382.
Kim HW, Lee S. Design and implementation of a private and public key crypto processor and its application to a security system. IEEE Trans Consumer Electronics February 2004;50(1): 214–24.
Hämäläinen P, Hännikäinen M, Hämäläinen T, Corporaal T, Saarvinen J. Implementation of encryption algorithms on transport triggered architecture. In: Proceedings International Symposium on Circuits and Systems (ISCAS 2001) May 2001: 6–9.
Farouk H, El-Hadidi MT, Abou El Farag A. GALS-based LPSP: Implementation of a novel architecture for low power high performance security processors. In: Proceedings 25th IEEE International Parallel and Distributed Processing Symposium 16–20 May 2011; 542–50.
Fronte D, Perez A, Payrat E. Celator: A multi-algorithm cryptographic co-processor. In: Proceedings of the International Conference on Reconfigurable Computing and FPGAs (ReConFig’08) 2008; 438–43.
Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM February 1978;21(2): 120–6.
Deb K, Pratap A, Agarwal S, Meyarivan T. A fast and elitist multi-objective genetic algorithm: NSGA-II. IEEE Trans. Evolutionary Computing April 2002; 6(2); 182–97.
Majzoub, Diab (b0160) 2012; 59
Elsayed HM, El-Hadidi MT, Osama K, Aslan H. Multi-objective genetic algorithm-based optimization of an asynchronous data-flow security processor. In: Proceedings 2016 33rd National Radio Science Conference (NRSC2016) 2016; 168–77.
Hämäläinen P, Heikkinen J, Hännikäinen M, Hämäläinen TD. Design of transport triggered architecture processors for wireless encryption. In: Proceedings 8th Euromicro Conference on Digital System Design (DSD’05) 2005; 144–52.
Gonzalez I, Gomez-Arribas FJ. Ciphering algorithms in Microblaze-based embedded systems. IEE Proc-Comput. Digit Tech March 2006;153(2); 87–92.
Reeves (b0230) 1996; 63
Sayilar G, Chiou D. Cryptoraptor: high throughput reconfigurable cryptographic processor. In: Proceedings Computer-Aided Design (ICCAD), 2014 IEEE/ACM International Conference on, 2–6 Nov. 2014; 155–61.
Niu, Wu, Liu, Zhang, Chen (b0170) 2013; 14
Taylor RR, Goldstein SC. A high-performance flexible architecture for cryptography. In: Proceedings Workshop on Cryptographic Hardware and Embedded Systems (CHES1999) August 1999; 231–45.
Shi, Lee (b0030) July 2000; 10–12
Arora D, Raghunathan A, Ravi S, Sankaradass M, Jha NK, Chakradhar ST. Software architecture exploration for high-performance security processing on a multiprocessor mobile SoC. In: Proceedings 43rd Annual Design Automation Conference July 24–28 2006; 496–501.
Koblitz N. Elliptic curve cryptosystems. Mathematics of Computation January 1987;48(177): 203–9.
Wu L, Weaver C, Austin T. CryptoManiac- a fast flexible architecture for secure communication. In: Proceedings 28th Annual International Symposium on Computer Architecture 30 June – 4 July 2001; 110–9.
IBM 4765 PCIe cryptographic coprocessor data sheet, IBM Corporation, 2011.
Kempf (b0210) 2011
Benhadjyoussef N, Elhadjyoussef W, Machhout M, Tourki R. Enhancing a 32-bit processor core with efficient cryptographic instructions. J Circ, Syst, Comp 2015;24(10).
Farouk, El-Hadidi, Abou El-Farag (b9000) 2012; 2
El-Hadidi MT, Elsayed HM, Aslan H, Osama K. Structured design approach for an optimal programmable synchronous security processor. In: Kim H, Choi D, editors. Information Security Applications 2015; 313–25.
Iyer A, Marculescu D. Power and performance evaluation of globally asynchronous locally synchronous processors. In: Proceedings 29th Annual International Symposium on Computer Architecture 2002; 158–68.
Bossuet L, Grand M, Gaspar L, Fischer V, Gogniat G. Architectures of flexible symmetric key crypto engines - A survey from hardware coprocessor to multi-crypto-processor system on chip. ACM Computing Surveys August 2013; 45(4) Article 41.
Theodoropolous D, Siskosy A, Pnevmatikatosy D. CCproc- a custom VLIW cryptography co-processor for symmetric-key ciphers. In: J. Becker et al., editors. Proceedings International Workshop on Applied Reconfigurable Computing (ARC2009): Reconfigurable Computing: Architectures, Tools and Applications, - LNCS 5453–2009; 318–23.
Großschädl J, Tillich S, Szekely A. Performance evaluation of instruction set extensions for long integer modular arithmetic on a SPARC V8 processor. Proceedings 10th Euromicro Conference on Digital System Design (DSD 2007) 2007: 680–9.
NIST. Advanced Encryption Standard, FIPS-Pub 197 26 November 26 2001.
Jenkins, Mamidi, Schulte, Glossner (b0050) 2010; 2
Sun K, Pan X, Wang J, Wang J. Design of a novel asynchronous reconfigurable architecture for cryptographic applications. In: Proceedings First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06) 20–24 June 2006; 751–7.
Elbirt AJ, Paar C. Instruction-level distributed processing for symmetric-key cryptography. In: IEEE Transactions on Parallel and Distributed Systems May 2005; 16(5); 468–80.
Han L, Han J, Zeng X, Lu R, Zhao J. A programmable security processor for cryptography algorithms. In: Proceedings 9th International Conference on Solid-State and Integrated-Circuit Technology (ICSICT 2008) 20–23 Oct. 2008; 2144–7.
Buchty R, Heintze N, Oliva D. Cryptonite – a programmable crypto processor architecture for high-bandwidth applications. In: Proceedings International Conference on Architecture of Computing Systems (ARCS 2004) 2004; 184–98.
Gueron (b0055) 2012
Dandalis A, Prasanna VK. An adaptive cryptographic engine for internet protocol security architectures. ACM Trans Des Automation Electronic Syst. July 2004;9(3); 333–53.
Tillich S, Großschädl J, Szekely A. An instruction set extension for fast and memory-efficient AES implementation. CMS 2005, LNCS 3677 2005: 11–21.
Konak, Coitb, Smith (b0220) 2006; 91
Li C, Jiang Y, Su D, Xu Y, Luo Z. A new design of low cost security coprocessor for portable electronic devices. In: Proceedings 2010 International Conference on Communications and Mobile Computing (CMC2010) April 2010; 12–4.
Grabher, Großschädl, Hoerder, Järvinen, Page, Tillich, Wójcik (b0120) 2010; 2
Wa B, Liu L. A flexible and energy-efficient reconfigurable architecture for symmetric cipher processing. 2015 IEEE International Symposium on Circuits and Systems (ISCAS) 24–27 May 2015; 1182–5.
Gries (b0205) 2004; 38
10.1016/j.jare.2017.11.002_b0035
10.1016/j.jare.2017.11.002_b0155
Jenkins (10.1016/j.jare.2017.11.002_b0050) 2010; 2
10.1016/j.jare.2017.11.002_b0110
10.1016/j.jare.2017.11.002_b0075
10.1016/j.jare.2017.11.002_b0195
10.1016/j.jare.2017.11.002_b0150
10.1016/j.jare.2017.11.002_b0190
Konak (10.1016/j.jare.2017.11.002_b0220) 2006; 91
Deb (10.1016/j.jare.2017.11.002_b0215) 2001
Reeves (10.1016/j.jare.2017.11.002_b0230) 1996; 63
Gries (10.1016/j.jare.2017.11.002_b0205) 2004; 38
Gueron (10.1016/j.jare.2017.11.002_b0055) 2012
10.1016/j.jare.2017.11.002_b0115
10.1016/j.jare.2017.11.002_b0235
10.1016/j.jare.2017.11.002_b0200
10.1016/j.jare.2017.11.002_b0045
10.1016/j.jare.2017.11.002_b0165
Farouk (10.1016/j.jare.2017.11.002_b9000) 2012; 2
10.1016/j.jare.2017.11.002_b0085
10.1016/j.jare.2017.11.002_b0040
Kempf (10.1016/j.jare.2017.11.002_b0210) 2011
Mohamadi (10.1016/j.jare.2017.11.002_b0240) 2010; 4
10.1016/j.jare.2017.11.002_b0080
Majzoub (10.1016/j.jare.2017.11.002_b0160) 2012; 59
Shi (10.1016/j.jare.2017.11.002_b0030) 2000; 10–12
10.1016/j.jare.2017.11.002_b0005
10.1016/j.jare.2017.11.002_b0125
10.1016/j.jare.2017.11.002_b0245
10.1016/j.jare.2017.11.002_b0010
10.1016/j.jare.2017.11.002_b0175
10.1016/j.jare.2017.11.002_b0130
10.1016/j.jare.2017.11.002_b0095
Grabher (10.1016/j.jare.2017.11.002_b0120) 2010; 2
10.1016/j.jare.2017.11.002_b0090
10.1016/j.jare.2017.11.002_b0250
10.1016/j.jare.2017.11.002_b0015
10.1016/j.jare.2017.11.002_b0135
10.1016/j.jare.2017.11.002_b0255
10.1016/j.jare.2017.11.002_b0145
10.1016/j.jare.2017.11.002_b0100
10.1016/j.jare.2017.11.002_b0065
10.1016/j.jare.2017.11.002_b0020
10.1016/j.jare.2017.11.002_b0185
10.1016/j.jare.2017.11.002_b0140
10.1016/j.jare.2017.11.002_b0060
Hodjat (10.1016/j.jare.2017.11.002_b0070) 2004
10.1016/j.jare.2017.11.002_b0180
Niu (10.1016/j.jare.2017.11.002_b0170) 2013; 14
10.1016/j.jare.2017.11.002_b0260
10.1016/j.jare.2017.11.002_b0105
10.1016/j.jare.2017.11.002_b0225
10.1016/j.jare.2017.11.002_b0025
References_xml – volume: 10–12
  start-page: 138
  year: July 2000
  end-page: 148
  ident: b0030
  article-title: Bit permutation instructions for accelerating software cryptography
  publication-title: Proc IEEE Int Conf Appl-specific Syst, Arch Processors
  contributor:
    fullname: Lee
– start-page: 34
  year: 2004
  end-page: 45
  ident: b0070
  publication-title: High-throughput programmable cryptocoprocessor. IEEE Micro May-June
  contributor:
    fullname: Verbauwhede
– year: 2012
  ident: b0055
  article-title: Intel® advanced encryption standard (AES) new instructions set
  contributor:
    fullname: Gueron
– volume: 63
  start-page: 371
  year: 1996
  end-page: 396
  ident: b0230
  article-title: Hybrid genetic algorithms for bin-packing and related problems
  publication-title: Ann Oper Res
  contributor:
    fullname: Reeves
– volume: 2
  start-page: 1
  year: 2010
  end-page: 18
  ident: b0120
  article-title: An exploration of mechanisms for dynamic cryptographic instruction set extension
  publication-title: J Cryptogr Eng
  contributor:
    fullname: Wójcik
– volume: 91
  start-page: 992
  year: 2006
  end-page: 1007
  ident: b0220
  article-title: Multi-objective optimization using genetic algorithms: a tutorial
  publication-title: Reliab Eng Syst Saf Sept
  contributor:
    fullname: Smith
– volume: 4
  start-page: 253
  year: 2010
  end-page: 266
  ident: b0240
  article-title: Application of genetic algorithm for the bin packing problem with a new representation scheme
  publication-title: Math Sci
  contributor:
    fullname: Mohamadi
– start-page: 23
  year: 2011
  end-page: 47
  ident: b0210
  article-title: Principles of design space exploration
  contributor:
    fullname: Kempf
– volume: 38
  start-page: 131
  year: 2004
  end-page: 183
  ident: b0205
  article-title: Methods for evaluating and covering the design space during early design development
  publication-title: VLSI J Dec
  contributor:
    fullname: Gries
– volume: 14
  start-page: 642
  year: 2013
  end-page: 651
  ident: b0170
  article-title: A 10 gbps in-line network security processor based on configurable hetero-multi-cores
  publication-title: J Zhejiang Univ-SCIENCE C (Comp Electron)
  contributor:
    fullname: Chen
– volume: 59
  start-page: 22
  year: 2012
  end-page: 41
  ident: b0160
  article-title: MorphoSys reconfigurable hardware for cryptography: the twofish case
  publication-title: J Supercomput
  contributor:
    fullname: Diab
– volume: 2
  start-page: 56
  year: 2012
  end-page: 78
  ident: b9000
  article-title: GALS-based LPSP: performance analysis of a novel architecture for low power high performance security processors
  publication-title: Int J Netw Comput
  contributor:
    fullname: Abou El-Farag
– volume: 2
  start-page: 203
  year: 2010
  end-page: 214
  ident: b0050
  article-title: Instruction set extensions for the advanced encryption standard on a multithreaded software defined radio platform
  publication-title: Int J High Perform Syst Arch
  contributor:
    fullname: Glossner
– year: 2001
  ident: b0215
  article-title: Multi-objective optimization using evolutionary algorithms
  contributor:
    fullname: Deb
– ident: 10.1016/j.jare.2017.11.002_b0040
  doi: 10.1007/11552055_2
– ident: 10.1016/j.jare.2017.11.002_b0085
  doi: 10.1109/ISCA.2001.937439
– volume: 10–12
  start-page: 138
  year: 2000
  ident: 10.1016/j.jare.2017.11.002_b0030
  article-title: Bit permutation instructions for accelerating software cryptography
  publication-title: Proc IEEE Int Conf Appl-specific Syst, Arch Processors
  contributor:
    fullname: Shi
– ident: 10.1016/j.jare.2017.11.002_b0035
  doi: 10.1145/513918.514113
– ident: 10.1016/j.jare.2017.11.002_b0020
– ident: 10.1016/j.jare.2017.11.002_b0175
– ident: 10.1016/j.jare.2017.11.002_b0140
  doi: 10.1049/ip-cdt:20050131
– ident: 10.1016/j.jare.2017.11.002_b0150
  doi: 10.1007/978-3-662-44491-7_10
– volume: 63
  start-page: 371
  issue: 3
  year: 1996
  ident: 10.1016/j.jare.2017.11.002_b0230
  article-title: Hybrid genetic algorithms for bin-packing and related problems
  publication-title: Ann Oper Res
  doi: 10.1007/BF02125404
  contributor:
    fullname: Reeves
– year: 2001
  ident: 10.1016/j.jare.2017.11.002_b0215
  contributor:
    fullname: Deb
– start-page: 34
  year: 2004
  ident: 10.1016/j.jare.2017.11.002_b0070
  publication-title: High-throughput programmable cryptocoprocessor. IEEE Micro May-June
  contributor:
    fullname: Hodjat
– ident: 10.1016/j.jare.2017.11.002_b0260
  doi: 10.1007/978-3-319-31875-2_26
– ident: 10.1016/j.jare.2017.11.002_b0155
– ident: 10.1016/j.jare.2017.11.002_b0065
  doi: 10.1109/TCE.2004.1277865
– start-page: 23
  year: 2011
  ident: 10.1016/j.jare.2017.11.002_b0210
  contributor:
    fullname: Kempf
– ident: 10.1016/j.jare.2017.11.002_b0245
  doi: 10.1109/NRSC.2016.7450850
– ident: 10.1016/j.jare.2017.11.002_b0010
  doi: 10.1145/359340.359342
– year: 2012
  ident: 10.1016/j.jare.2017.11.002_b0055
  contributor:
    fullname: Gueron
– volume: 91
  start-page: 992
  issue: 9
  year: 2006
  ident: 10.1016/j.jare.2017.11.002_b0220
  article-title: Multi-objective optimization using genetic algorithms: a tutorial
  publication-title: Reliab Eng Syst Saf Sept
  doi: 10.1016/j.ress.2005.11.018
  contributor:
    fullname: Konak
– ident: 10.1016/j.jare.2017.11.002_b0095
  doi: 10.1145/1146909.1147040
– ident: 10.1016/j.jare.2017.11.002_b0225
  doi: 10.1109/4235.996017
– volume: 2
  start-page: 1
  year: 2010
  ident: 10.1016/j.jare.2017.11.002_b0120
  article-title: An exploration of mechanisms for dynamic cryptographic instruction set extension
  publication-title: J Cryptogr Eng
  doi: 10.1007/s13389-011-0025-8
  contributor:
    fullname: Grabher
– ident: 10.1016/j.jare.2017.11.002_b0200
– volume: 4
  start-page: 253
  issue: 3
  year: 2010
  ident: 10.1016/j.jare.2017.11.002_b0240
  article-title: Application of genetic algorithm for the bin packing problem with a new representation scheme
  publication-title: Math Sci
  contributor:
    fullname: Mohamadi
– ident: 10.1016/j.jare.2017.11.002_b0180
  doi: 10.1109/DSD.2005.33
– ident: 10.1016/j.jare.2017.11.002_b0110
  doi: 10.1109/IPDPS.2011.199
– ident: 10.1016/j.jare.2017.11.002_b0165
  doi: 10.1007/978-3-642-00641-8_35
– volume: 38
  start-page: 131
  issue: 2
  year: 2004
  ident: 10.1016/j.jare.2017.11.002_b0205
  article-title: Methods for evaluating and covering the design space during early design development
  publication-title: VLSI J Dec
  doi: 10.1016/S0167-9260(04)00032-X
  contributor:
    fullname: Gries
– volume: 2
  start-page: 56
  issue: 1
  year: 2012
  ident: 10.1016/j.jare.2017.11.002_b9000
  article-title: GALS-based LPSP: performance analysis of a novel architecture for low power high performance security processors
  publication-title: Int J Netw Comput
  doi: 10.15803/ijnc.2.1_56
  contributor:
    fullname: Farouk
– ident: 10.1016/j.jare.2017.11.002_b0130
  doi: 10.1007/3-540-48059-5_20
– ident: 10.1016/j.jare.2017.11.002_b0185
  doi: 10.1109/ReConFig.2008.76
– ident: 10.1016/j.jare.2017.11.002_b0015
  doi: 10.1090/S0025-5718-1987-0866109-5
– volume: 2
  start-page: 203
  issue: 2–3
  year: 2010
  ident: 10.1016/j.jare.2017.11.002_b0050
  article-title: Instruction set extensions for the advanced encryption standard on a multithreaded software defined radio platform
  publication-title: Int J High Perform Syst Arch
  doi: 10.1504/IJHPSA.2010.034541
  contributor:
    fullname: Jenkins
– ident: 10.1016/j.jare.2017.11.002_b0060
  doi: 10.1142/S0218126615501583
– ident: 10.1016/j.jare.2017.11.002_b0125
  doi: 10.1109/TPDS.2005.51
– ident: 10.1016/j.jare.2017.11.002_b0025
  doi: 10.1145/2501654.2501655
– volume: 59
  start-page: 22
  issue: 1
  year: 2012
  ident: 10.1016/j.jare.2017.11.002_b0160
  article-title: MorphoSys reconfigurable hardware for cryptography: the twofish case
  publication-title: J Supercomput
  doi: 10.1007/s11227-010-0413-3
  contributor:
    fullname: Majzoub
– ident: 10.1016/j.jare.2017.11.002_b0080
– ident: 10.1016/j.jare.2017.11.002_b0190
  doi: 10.1109/ICCAD.2014.7001346
– ident: 10.1016/j.jare.2017.11.002_b0045
  doi: 10.1109/DSD.2007.4341542
– ident: 10.1016/j.jare.2017.11.002_b0100
  doi: 10.1109/ICSICT.2008.4734992
– ident: 10.1016/j.jare.2017.11.002_b0255
  doi: 10.1109/TVLSI.2009.2037327
– ident: 10.1016/j.jare.2017.11.002_b0250
  doi: 10.1109/ISCA.2002.1003573
– ident: 10.1016/j.jare.2017.11.002_b0115
  doi: 10.1109/IWRSP.2000.855217
– volume: 14
  start-page: 642
  issue: 8
  year: 2013
  ident: 10.1016/j.jare.2017.11.002_b0170
  article-title: A 10 gbps in-line network security processor based on configurable hetero-multi-cores
  publication-title: J Zhejiang Univ-SCIENCE C (Comp Electron)
  doi: 10.1631/jzus.C1200370
  contributor:
    fullname: Niu
– ident: 10.1016/j.jare.2017.11.002_b0090
  doi: 10.1007/978-3-540-24714-2_15
– ident: 10.1016/j.jare.2017.11.002_b0075
– ident: 10.1016/j.jare.2017.11.002_b0105
  doi: 10.1109/CMC.2010.127
– ident: 10.1016/j.jare.2017.11.002_b0145
  doi: 10.1109/IMSCCS.2006.208
– ident: 10.1016/j.jare.2017.11.002_b0235
  doi: 10.1109/CAIA.1993.366666
– ident: 10.1016/j.jare.2017.11.002_b0195
  doi: 10.1109/IPDPS.2011.143
– ident: 10.1016/j.jare.2017.11.002_b0005
– ident: 10.1016/j.jare.2017.11.002_b0135
  doi: 10.1145/1013948.1013952
SSID ssj0000388911
Score 2.1568415
Snippet [Display omitted] The optimization of a novel programmable data-flow crypto processor dedicated to security applications is considered. An architecture based...
The optimization of a novel programmable data-flow crypto processor dedicated to security applications is considered. An architecture based on assigning basic...
SourceID doaj
pubmedcentral
proquest
crossref
pubmed
elsevier
SourceType Open Website
Open Access Repository
Aggregation Database
Index Database
Publisher
StartPage 67
SubjectTerms Data-flow crypto processor
Design space exploration
FPGA implementation
Multi-objective optimization
NSGA-II Genetic Algorithm
Programmable crypto processor
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9QwELZQT1wQ5RmgyEgcQCiwiRM_jgVRWg7lABW9WX62W-0mq3RLxb9nxnGqXZDgwi1KrCTzsGcm-eYzIS9xyfc4AStpeNmIwErLFRxVEG2a4GtjEtrimB-eNJ9P29ONrb4QEzbSA4-KexcdBCHrZVN530gPEcx51Srng4tSNj6tvjO1UUylNZhJqdLmu_VMIfyA1bljZgR3XZgBOTIr8RYpPPM3lSkqJfL-reD0Z_L5O4ZyIygd3CV3cjZJ90cpdsmt0N0ju3m-XtJXmVT69X3y_QusDcvcdEn7SA3t-h9hQTNAa4ktVBTxomVc9NfUDT9X656uxj6CfqAIkD-jx18_7ZdHR9Qszvphvj5fPiAnBx-_fTgs86YKpcO9C0plYxMh7zMycDCg8GLmXWSRmWCsaE3dgl5jLS3qveIW0iMjkURMIs-Nk-wh2en6Ljwm1DVRMSOcdBzqDK5MzXwIUljLpRWSFeTNpFS9Grkz9AQqu9BoAo0mgCJEgwkK8h71fjMSea_TCfAGnb1B_8sbCtJOVtM5hRhTA7jV_K8PfzGZWMP8wp8mpgv91SUMgoJMIcteQR6NJr95RZZ-DMtZQcSWM2zJsH2lm58nDm-oIkXD-ZP_IfRTchtEkSOI-BnZWQ9XYQ9SpbV9nmbFL9C7EcI
  priority: 102
  providerName: Directory of Open Access Journals
– databaseName: ScienceDirect
  dbid: IXB
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwELaqnrggyjMUkJE4gFDYTezYzrGtKC2HcigVe7P83KbaTVbpFsS_x-M4KwISB255OMnEY49n7G8-I_QGTL6FDlgIxXLKHck1q8NREUYb6mypVERbXLCzK_p5US320MmYCwOwymT7B5serXW6Mku1Ods0zeyynNfRIShiI-UQt5OqiEl8i-PdPAuwndRxG14on8MDKXdmgHndqB7YMgv-Acg80-zKOD5FGv_JMPW3G_onmvK34en0Abqf_Ep8NIh-gPZc-xAdpJ57i98meul3j9C3L8FKrFP6Je48VrjtvrsVTlCtNSRTYUCO5n7V_cCm_7nZdngzZBR0PQao_BJfXH46ys_PsVotu77ZXq8fo6vTj19PzvK0vUJuYBeDvNae-uABKuFYUCW3fG6NJ54opzSvVFkZL3wptAE3gOngKCkBdGICGG-MIE_Qftu17hnChvqaKG6EYSHiYLUqiXVOcK2Z0FyQDL0fK1VuBhYNOcLLbiSoQIIKQjgigwoydAz1visJDNjxQtcvZWoC0oNU2gpaWEuFDZ6NsXVVG-uC1ILaDFWj1uSkQYVXNf_8-OtRxTL0NFg-Ua3r7m5DoRCa1cC3l6Gng8p3IpK4RCzmGeKTxjD5h-mdtrmObN4hnuSUsef_Ke8huhfOxIAgfoH2t_2dexn8pK1-FTvCLz4XEKc
  priority: 102
  providerName: Elsevier
Title Optimization of a novel programmable data-flow crypto processor using NSGA-II algorithm
URI https://dx.doi.org/10.1016/j.jare.2017.11.002
https://www.ncbi.nlm.nih.gov/pubmed/30046480
https://search.proquest.com/docview/2076897786
https://pubmed.ncbi.nlm.nih.gov/PMC6057466
https://doaj.org/article/fc218bd841dd48d081cd959cdecf884d
Volume 12
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwELbacuGCKM_wWBmJAwhlH3nYznFbUbpUFARU3Vvk53ar3WSVblvx75lxnGoXJA5coihxkklmbH-Ov_lMyFts8g1WwJGQLM64TWPFCtgbQW-TWZNI6dkWp-z4LPs8zac7JO9yYTxpX6t5v1os-9X8wnMrV0s96Hhig29fDgGC84yxwS7ZhQDdGKL75jcVovDr7ibDApkHaRKSZVpe16VsUB5zxPuo3jnE5WxSP8GHypAbfZOX8N_qov6GoH8yKTe6pqOH5EHAlHTc2r5Pdmz1iOyHWntF3wVp6fePyflXaCGWIfWS1o5KWtU3dkEDTWuJiVQUWaOxW9S3VDe_VuuartpsgrqhSJOf0dMfn8bxZELlYlY38_XF8gk5O_r48_A4DksrxBpXMIgL5TIH6E8Ky8CN3PCh0S51qbRS8VwmuXbCJUJphABMAUiSAqXEBKrdaJE-JXtVXdnnhOrMFankWmgGow1WyCQ11gquFBOKizQiH7qPWq5aBY2yo5ZdluiNEr0BQ5ESvBGRA_zudyVR_dofqJtZGWKgdGiVMiIbGZMJA6hGmyIvtLFgtchMRPLOa2UAEi1AgFvN__nwN52LS6hlOHUiK1tfX0EhGJYVqLUXkWety-9M7KInInwrGLbeYfsMBLZX8g6B_OK_r3xJ7oP9ouUPvyJ76-bavgaUtFY9cm988v38pOf_MsB2Mj3o-ZryG8uRFHI
link.rule.ids 230,315,730,783,787,867,888,2109,3513,27936,27937,45886,53804,53806
linkProvider National Library of Medicine
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwELZKOcAFUZ7haSQOIJR9xI7tHEtF2YV2QaIVvVl-brfaJKt0C-Lf43GSahckDtyixElsz4z9Wf7mM0KvYci3EIBjoVhKuSOpZkW4GofZhjqbKRXZFjM2OaWfzvKzHZT3uTCRtG_0YlAty0G1OI_cylVphj1PbPj1-CBAcE4ZG95AN0O8jujGIj0OwESIIp68m40K4B6QrEuXaZldF6oBgcwxH4B-5wgOtCFxiw-0ITdmpyjivzVJ_Q1C_-RSbkxOh3fRnQ5V4v229ntox1X30F4Xt5f4TScu_fY--v4ljBFll3yJa48Vruofbok7olYJqVQYeKOpX9Y_sWl-rdY1XrX5BHWDgSg_x7NvH_fT6RSr5bxuFuvz8gE6PfxwcjBJu8MVUgNnGKSF9tQH_KeEY8GQ3PKRNZ54opzSPFdZbrzwmdAGQADTASYpAWJiAvRujCAP0W5VV-4xwob6gihuhGFhvcEKlRHrnOBaM6G5IAl613eqXLUaGrInl11IsIYEa4TFiAzWSNB76PfrkqB_HW_UzVx2XiA91EpbQcfWUmEDrjG2yAtjXai1oDZBeW812UGJFiKETy3--fNXvYlliDPYPFGVq68uQ6GwMCtAbS9Bj1qTX1ex954E8S1n2GrD9pPg2lHLu3PlJ__95kt0a3JyfCSPprPPT9Ht0BbRsomfod11c-WeB8y01i9ihPwG0xgULA
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwELagSIgLankGChiJAwhlH3FiO8dSWLo8lkpQ0Zvl53ar3SRKtyD-PR7HqXZB4sAtSpzE9szYn-XP3yD0AoZ8AwE45pKmObMkVbT0V2M_2-TWZFIGtsWMHp3kH06L041UX4G0r9ViUC1Xg2pxFriVzUoPe57Y8PjzoYfgLKd02Bg3vI5u-Jgd0Y2FehiECedlyL6bjUrgH5AsHpnp2F3nsgWRzDEbgIbnCJLakLDNB_qQGzNUEPLfmqj-BqJ_8ik3JqjJLrodkSU-6Fqwh67Z6g7ai7F7gV9GgelXd9H3L36cWMUDmLh2WOKq_mGXOJK1VnCcCgN3NHXL-ifW7a9mXeOmO1NQtxjI8nM8-_r-IJ1OsVzO63axPlvdQyeTd98Oj9KYYCHVkMcgLZXLnceAklvqjckMGxntiCPSSsUKmRXacZdxpQEIUOWhkuQgKMZB80Zzch_tVHVlHyKsc1cSyTTX1K85aCkzYqzlTCnKFeMkQa_7ThVNp6MheoLZuQBrCLCGX5AIb40EvYF-vyoJGtjhRt3ORfQE4aBWyvB8bEzOjcc22pRFqY31tea5SVDRW01EONHBBP-pxT9__rw3sfCxBhsosrL15YUv5BdnJSjuJehBZ_KrKvbekyC25Qxbbdh-4t076HlHd370328-QzeP307Ep-ns42N0yzeFd4TifbSzbi_tEw-b1uppCJDfxnQVPw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Optimization+of+a+novel+programmable+data-flow+crypto+processor+using+NSGA-II+algorithm&rft.jtitle=Journal+of+advanced+research&rft.au=El-Hadidi%2C+Mahmoud+T&rft.au=Elsayed%2C+Hany+M&rft.au=Osama%2C+Karim&rft.au=Bakr%2C+Mohamed&rft.date=2018-07-01&rft.issn=2090-1232&rft.volume=12&rft.spage=67&rft_id=info:doi/10.1016%2Fj.jare.2017.11.002&rft_id=info%3Apmid%2F30046480&rft.externalDocID=30046480
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2090-1232&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2090-1232&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2090-1232&client=summon